The following pages link to (Q4536229):
Displayed 27 items.
- First-order side channel attacks on Zhang's countermeasures (Q433061) (← links)
- Polar differential power attacks and evaluation (Q439840) (← links)
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks (Q892289) (← links)
- Toward reverse engineering on secret \(S\)-boxes in block ciphers (Q893703) (← links)
- Statistical properties of side-channel and fault injection attacks using coding theory (Q1749798) (← links)
- Multivariate high-order attacks of shuffled tables recomputation (Q1753166) (← links)
- White-box cryptography: don't forget about grey-box attacks (Q2010584) (← links)
- Protecting secure ICs against side-channel attacks by identifying and quantifying potential EM and leakage hotspots at simulation stage (Q2145294) (← links)
- Power attacks on a side-channel resistant elliptic curve implementation (Q2390277) (← links)
- On two DES implementations secure against differential power analysis in smart-cards (Q2500477) (← links)
- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON (Q2790039) (← links)
- Polynomial Evaluation and Side Channel Analysis (Q2803637) (← links)
- On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages (Q2946470) (← links)
- Near Collision Attack on the Grain v1 Stream Cipher (Q2946894) (← links)
- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box (Q2947102) (← links)
- Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations (Q2958137) (← links)
- Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers (Q2975800) (← links)
- Montgomery’s Trick and Fast Implementation of Masked AES (Q3011910) (← links)
- Affine Masking against Higher-Order Side Channel Analysis (Q3084260) (← links)
- SCATTER: A New Dimension in Side-Channel (Q3297554) (← links)
- Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces (Q3454163) (← links)
- Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik (Q5071470) (← links)
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions (Q5458227) (← links)
- Revisiting mutual information analysis: multidimensionality, neural estimation and optimality proofs (Q6054729) (← links)
- Higher-order masking scheme for Trivium hardware implementation (Q6134029) (← links)
- Higher-order masked Saber (Q6134812) (← links)